Zuzana Kominkova Oplatkova

Zuzana Kominkova Oplatkova
Tomas Bata University in Zlín · Department of Informatics and Artificial Intelligence

assoc.prof., Eng., Ph.D.

About

170
Publications
26,023
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,361
Citations

Publications

Publications (170)
Chapter
This paper provides a closer insight into applicability and performance of the hybridization of symbolic regression open framework, which is Analytical Programming (AP) and Differential Evolution (DE) algorithm in the task of time series regression. AP can be considered as a robust open framework for symbolic regression thanks to its usability in a...
Chapter
The paper deals with an approach for a reliable dogface detection in an image using the convolutional neural networks. Two detectors were trained on a dataset containing 8351 real-world images of different dog breeds. The first detector achieved the average precision equal to 0.79 while running real-time on single CPU, the second one achieved the a...
Chapter
This research deals with the comparison of three novelty approaches for constant estimation in analytic programming (AP) powered by Success-history based Differential evolution (SHADE). AP is a tool for symbolic regression tasks which enables to synthesise an analytical solution based on the required behaviour of the system. This paper offers anoth...
Chapter
This research deals with the hybridization of two computational intelligence fields, which are the chaos theory and evolutionary algorithms. Experiments are focused on the extensive investigation on the different randomization schemes for selection of individuals in differential evolution algorithm (DE).
Chapter
Full-text available
Spam refers to unsolicited bulk email. Many algorithms have been applied to the spam detection problem and many programs have been developed. The problem is an adversarial one and an ongoing fight against spammers. We prove that reliable Spam detection is an NP-complete problem, by mapping email spams to metamorphic viruses and applying Spinellis’s...
Article
Full-text available
This article presents a comparative study of the classification of Elliott waves in data. Regarding the methods of classification, the paper deals with three approaches. The first one is a multilayer artificial neural network (ANN) with sigmoid activation function and backpropagation and Levenberg–Marquardt training algorithm. Second approach uses...
Chapter
This chapter deals with the hybridization of the chaos driven heuristics concept and complex networks framework for meta-heuristic. This research aims on the experimental investigations on the time development and influence of different randomization types, different strategies for Differential Evolution (DE) through the analysis of complex network...
Conference Paper
The aim of the work is to determine the coordinate system of an eye and insert a polar-axis system into images captured by a slip lamp. The image of the eye with the polar axis helps a surgeon accurately implant toric intraocular lens in the required position/rotation during the cataract surgery. In this paper, two common algorithms for pupil detec...
Conference Paper
Full-text available
Spam refers to unsolicited bulk email. Many algorithms have been applied to the spam detection problem and many programs have been developed. The problem is an adversarial one and an ongoing fight against spammers. We prove that reliable Spam detection is an NP-complete problem, by mapping email spams to metamorphic viruses and applying Spinellis [...
Conference Paper
This research deals with the hybridization of several approaches for evolutionary algorithms, which are the adaptive control parameter adjusting strategy and multi-chaotic dynamics driving the selection of indices in Differential Evolution (DE). The novelty of the paper is given by the experiments with the multi-chaos-driven adaptive DE concept ins...
Article
Full-text available
One of the main challenges in integrated circuits development is to propose alternatives to handle the extreme heat generated by high frequency of electrons moving in a reduced space that cause overheating and reduce the lifespan of the device. The use of cooling fins offers an alternative to enhance the heat transfer using combined a conduction-co...
Chapter
This chapter deals with the pattern recognition in the time series. The data was obtained from the measurement of the force profiles via strain gauge sensor. This pattern recognition should help to classify different techniques of the professional defence (direct punch, direct and round kicks) and gender of the attacker. The aim is to find a suitab...
Article
Full-text available
Emotions represent feelings about people in several situations. Various machine learning algorithms have been developed for emotion detection in a multimedia element, such as an image or a video. These techniques can be measured by comparing their accuracy with a given dataset in order to determine which algorithm can be selected among others. This...
Book
This book presents new methods for and approaches to real-world problems as well as exploratory research describing novel mathematics and cybernetics applications in intelligent systems. It focuses on modern trends in selected fields of technological systems and automation control theory. It also introduces new algorithms, methods and applications...
Book
This book presents new methods and approaches to real-world problems as well as exploratory research that describes novel artificial intelligence applications, including deep learning, neural networks and hybrid algorithms. This book constitutes the refereed proceedings of the Artificial Intelligence Trends in Intelligent Systems Section of the 6t...
Conference Paper
This poster deals with botnets, the most dangerous kind of mobile malware, and their detection using neural networks. Unlike common mobile malware, botnets often have a complicated pattern of behavior because they are not managed by predictable algorithms but they are controlled by humans via command and control servers (C&C servers) or via peer-to...
Article
Full-text available
Fuzzy sets extend deterministic multi-criteria decision-making (MCDM) methods to deal with uncertainty and imprecision in decision making. Over the years, many generalizations have been proposed to the classical Fuzzy sets to deal with different kinds of imprecise and subjective data. One such generalization is Atanassov’s Intuitionistic Fuzzy Set...
Chapter
This research deals with synthesis of final complex expressions by means of an evolutionary symbolic regression technique—analytic programming (AP)—for novel approach to classification and system control. In the first case, classification technique—pseudo neural network is synthesized, i.e. relation between inputs and outputs created. The inspirati...
Chapter
Wealthy nations continue to demonstrate their unwavering support to improving conditions and the general well-being of poor countries in spite of the recent economic crises. However, as developmental aid relatively shrinks, both Aid donors and recipient countries have shown keen interest in methodologies used in evaluating developmental assistance...
Conference Paper
Full-text available
An investigation is performed of a machine learning algorithm and the Bayesian classifier in the spam-filtering context. The paper shows the advantage of the use of Reverse Polish Notation (RPN) expressions with feature extraction compared to the traditional Naïve Bayesian classifier used for spam detection assuming the same features. The performan...
Chapter
This paper is focused on possible utilization of an artificial neural network connected with biometric systems and motion animation for the purpose of training of self-defense techniques. The described experiment was performed in a specialized laboratory of university hospital in Brno with the help of VICON system. The aim was to obtain new inputs...
Article
Full-text available
Governments around the world are increasingly showing keen interests in venture capital investments in technology start-up businesses. However, determining the commercial potential of a new Technology start-up business is generally seen as a complex exercise especially in a government-controlled setting where selection of candidates can be clouded...
Chapter
This work deals with the hybridization of the complex networks framework and evolutionary algorithms. The population is visualized as an evolving complex network, which exhibits non-trivial features. This paper investigates briefly the time development of complex network within the run of selected metaheuristic algorithm, which is Differential Evol...
Chapter
Developmental Aid Programs or what is normally referred to as Official Development Assistance (ODA), plays a key role in the growth process of many underdeveloped and developing countries. However, with a recent growing scarcity of resources and a general call for strict accountability from aid-recipient countries, there has been some interests in...
Article
Full-text available
This paper deals with the comparison of three implementations of Particle Swarm Optimization (PSO), which is a powerful algorithm utilized for optimization purposes. Xamarin, a cross-platform development software, was used to build a single C# application capable of being executed on three different mobile operating systems (OS) devices, namely And...
Book
The volume Automation Control Theory Perspectives in Intelligent Systems presents new approaches and methods to real-world problems, and in particular, exploratory research that describes novel approaches in the field of cybernetics and automation control theory. Particular emphasis is laid on modern trends in intelligent information technology, sy...
Book
This volume is based on the research papers presented in the 5th Computer Science On-line Conference. The volume Artificial Intelligence Perspectives in Intelligent Systems presents modern trends and methods to real-world problems, and in particular, exploratory research that describes novel approaches in the field of artificial intelligence. New...
Article
Full-text available
Public Venture Capital financing often fail rigorous scrutiny in their selection of high-potential start-ups as compared to Private Venture capital. In some developing countries, decision making on final selection for financial support of early stage but high potential Small and Medium sized Enterprises (SMEs) are often 'clouded' by several factors...
Article
This research deals with the hybridization of the two soft-computing fields, which are chaos theory and evolutionary computation. This paper aims on the experimental investigations on the chaos-driven evolutionary algorithm Differential Evolution (DE) concept. This research represents the continuation of the satisfactory results obtained by means o...
Chapter
This research deals with the hybridization of the two modern approaches for evolutionary algorithms, which are the adaptivity and complex chaotic dynamics. This paper aims on the investigations on the chaos-driven adaptive Differential Evolution (DE) concept. This paper is aimed at the embedding of discrete dissipative chaotic systems in the form o...
Chapter
This research deals with a novel approach to classification. New classifiers are synthesized as a complex structure via evolutionary symbolic computation techniques. Compared to previous research, this paper synthesizes multi-input-multi-output (MIMO) classifiers with different cost function based on distance measurements. An inspiration for this w...
Article
This paper investigates the utilization of the time-continuous chaotic system, which is UEDA oscillator, as the chaotic pseudo random number generator. (CPRNG). Repeated simulations were performed investigating the influence of the oscillator sampling time to the selected heuristic, which is differential evolution algorithm (DE). Initial experiment...
Article
This research deals with the analysis of the behaviour of artificial neural nets for prediction of raw material batches for the production of clinker. During the production several oxides that are present in raw materials in quarries have to be extracted for homogenization of the mixture suitable for clinker production. There is some delay between...
Article
This article is focused on presenting our research about direct punch force. Professional defence is very important part of our life and punches are basic technique in majority of martial arts. Our aim was to measure dependence of force on time. Then we found differences between genders and among groups of participants with different level of train...
Article
This research deals with optimization of the control of chaos by means of evolutionary algorithms. The main aim of this work is to show that evolutionary algorithms are capable of the optimization of chaos control and to show a new approach of solving this problem and constructing new cost functions operating in 'blackbox mode' without previous exa...
Conference Paper
This paper studies how redundant data affect maximizing of weighted distances of vectors in a set of vectors. To maximize distances differential evolution is used, because the problem does not have analytical solution and is complex. This paper at first describes suppressing of redundant data mathematically and then it checks this theoretical resul...
Article
This paper aims on the initial investigations on the novel adaptive multi-chaos-driven evolutionary algorithm Differential Evolution (DE). This paper is focused on the embedding and adaptive alternating of set of two discrete dissipative chaotic systems in the form of chaotic pseudo random number generators for the DE. In this paper the novel adapt...
Article
Full-text available
Today, tens and thousands of websites provide health-related information on various topics to a growing number of consumers. However, the lay user is often faced with a challenge of determining the quality of information provided by one site from the other. To ensure the protection of users from sites that provide unreliable and unsafe information,...
Chapter
This paper briefly investigates the utilization of the both discrete dissipative chaotic system as well as the time-continuous chaotic systems as the chaotic pseudo random number generators. (CPRNGs) Several examples of chaotic systems are simulated, statistically analyzed and compared within this brief survey.
Book
This volume is based on the research papers presented in the 4th Computer Science On-line Conference. The volume Intelligent Systems in Cybernetics and Automation Control Theory presents new approaches and methods to real-world problems, and in particular, exploratory research that describes novel approaches in the field of cybernetics and automat...
Article
Countries described as 'fragile states' need timely sustained assistance to help rebuild basic infrastructure and institutions. However, with available funds becoming limited and number of 'fragile states' increasing, competition for such assistances have also become intense. To select countries for the fragile states support facility, a number of...
Conference Paper
This paper presents results of the utilization of selected discrete chaotic map, which is Dissipative standard map, as pseudo-random number generator for the differential evolution (DE) optimization algorithm and Particle Swarm Optimization (PSO) algorithm in the task of PID controller design for the selected 4th order dynamical system. The results...
Article
In this chapter, it is presented a utilization of a novel tool for symbolic regression, which is analytic programming, for the purpose of the synthesis of a new feedback control law. This new synthesized chaotic controller secures the fully stabilization of selected discrete chaotic systems, which is the two-dimensional Lozi map. The paper consists...
Article
Full-text available
Aid recipient-countries especially those classified as ‘fragile states’ look to donor agencies and other financial organizations for various forms of support facilities to rebuild institutions and repair infrastructure. As countries within the fragile states bracket increase around the world, competition for such assistances has also become keen. T...
Conference Paper
Full-text available
The utilization of Social media tools in business enterprises has tremendously increased with an increased number of users and a corresponding upsurge in time spent online. Online social media services such as Facebook and Twitter are used by companies to introduce new products and services, provide various supports and interact with customers on d...
Article
Full-text available
Purpose – The purpose of this paper is to propose a new assessment methodology for the African Peer Review Mechanism (APRM) using fuzzy comprehensive evaluation method (FCEM) and the Delphi technique. The proposed approach by its design simplifies the review processes and also quantifies the outcome of the assessment result for easier interpretatio...
Article
Full-text available
Evolutionary technique differential evolution (DE) is used for the evolutionary tuning of controller parameters for the stabilization of set of different chaotic systems. The novelty of the approach is that the selected controlled discrete dissipative chaotic system is used also as the chaotic pseudorandom number generator to drive the mutation and...
Chapter
This paper outlines the extended investigations on the concept of a chaos driven Differential Evolution. The focus of this paper is the embedding of chaotic systems in the form of chaos number generator for Differential Evolution. The chaotic systems of interest are the discrete dissipative systems. Three chaotic systems were selected as possible c...
Conference Paper
This research deals with the hybridization of the two softcomputing fields, which are chaos theory and evolutionary computation. This paper aims on the investigations on the multi-chaos-driven evolutionary algorithm Differential Evolution (DE) concept. This paper is aimed at the embedding and alternating of set of two discrete dissipative chaotic s...
Conference Paper
This research deals with the initial investigations on the concept of a multi-chaos-driven evolutionary algorithm Differential Evolution (DE). This paper is aimed at the embedding and alternating of set of two discrete dissipative chaotic systems in the form of chaos pseudo random number generator for DE. Repeated simulations were performed on the...
Conference Paper
Inherent part of evolutionary algorithms that are based on Darwin theory of evolution and Mendel theory of genetic heritage, are random processes that are used in every evolutionary algorithm like genetic algorithms etc. In this paper we present experiments (based on our previous) of selected evolutionary algorithms and test functions demonstrating...
Conference Paper
This research deals with the deeper analysis of the novel concept of a multi-chaos-driven evolutionary algorithm Differential Evolution (DE). This paper is aimed at the embedding and alternating of set of two discrete dissipative chaotic systems in the form of chaos pseudo random number generator for DE. Repeated simulations were performed on the s...
Conference Paper
Full-text available
Cluster analysis or clustering is a task of grouping a set of objects in such a way that objects in the same group (called a cluster) are more similar (in some sense or another) to each other than to those in other groups (clusters). It is the main task of exploratory data mining and a common technique for statistical data analysis used in many fie...
Conference Paper
This research deals with a novel approach to classification. This paper deals with a synthesis of a complex structure which serves as a classifier. Compared to previous research, this paper synthesizes multi-input–multi-output (MIMO) classifiers. Classical artificial neural networks (ANN) were an inspiration for this work. The proposed technique cr...
Conference Paper
In this initial study it is investigated the possibility of using simple artificial neural network for classification of kick techniques based on their specific force course profile. The aim is to investigate whether the neural networks could be a suitable tool for such task and can be possibly used in following research that will deal with classif...
Chapter
The term ‘green economy’ has recently become a topical issue that has engaged the attention of Governments, International bodies and the media. The understanding of this concept and policy concentration is carved in various ways depending on the body that is engaged. There exist varied definitions of the ‘green economy’ with many associating it dir...
Article
This paper investigates the utilization of the discrete dissipative chaotic system as the chaotic pseudo random number generators. (CPRNGs) Several discrete chaotic maps are simulated, statistically analyzed and compared within this initial research study.
Article
A novel tool for symbolic regression, analytical programming and its application for the synthesis of a new robust feedback control law are presented in this paper. This synthesized robust chaotic controller secures the fully stabilization of several selected sets containing one-dimensional, two-dimensional and evolutionary synthesized discrete cha...
Chapter
This work represents the brief introduction into the issue of development of complex cost function for evolutionary optimization of control of discrete chaotic systems. This work introduces briefly the evolutionary approach representing tuning of parameters for an existing control method. The main part of this work is focused on the process of deve...
Article
The United Nations’ target date to achieve its Millennium Development Goals (MDGs) to free people from extreme poverty and multiple deprivations is 2015. As the date approaches, several attempts have been made to evaluate the performance of the set goals, targets, and indicators. Although the methodology used to measure the performance of member co...
Chapter
This research deals with the extended investigations on the concept of a chaos-driven evolutionary algorithm Differential Evolution (DE). This paper is aimed at the embedding of set of six discrete dissipative chaotic systems in the form of chaos pseudo random number generator for DE. Repeated simulations were performed on the set of two shifted be...
Article
In this paper, evolutionary technique Differential Evolution (DE) is used for the evolutionary tuning of controller parameters for the stabilization of chaotic Burgers map system. The novality of the approach is that the identical selected discrete dissipative chaotic system is used also as the chaotic pseudo random number generator to drive the mu...
Article
In this paper, Differential Evolution (DE) is used for the evolutionary optimization of control of chaotic Lozi map system. The novality of the approach is that the identical selected discrete dissipative chaotic system is used as the chaotic pseudo random number generator to drive the mutation and crossover process in the DE. The optimization was...
Article
This research deals with the hybridization of the two softcomputing fields, which are chaos theory and evolutionary computation. This paper aims on the deeper investigations on the multi-chaos-driven evolutionary algorithm Differential Evolution (DE) concept. This research is aimed at the embedding and alternating of set of two discrete dissipative...
Article
This research deals with a novel approach to classification. This paper deals with a synthesis of a complex structure, which serves as a classifier. This structure is similar to classical artificial neural net therefore the name pseudo neural network is used. The proposed method for classifier structure synthesis utilizes Analytic Programming (AP)...
Article
The possibility of using artificial neural network for person gender classification based on kick force profile is investigated in this paper. The input data are transformed using discrete cosine transformation for easier classification. Extensive tuning is performed on the proposed artificial neural network to obtain better results. This prelimina...
Article
This paper is aimed at the embedding and alternating of set of two discrete dissipative chaotic systems in the form of chaos pseudo random number generator for DE. This research deals with the initial investigations on the concept of a multi-chaos-driven evolutionary algorithm Differential Evolution (DE). This research represents the continuation o...
Article
This chapter deals with using soft computing methods in information security. It is engaged in two big areas: (1) information security and spam detection and (2) cryptography. The latter field is covered by a proposal of an artificial neural network application, which represents a way of further development in this area. Such a neural network can b...
Chapter
This paper explores suitability of using of differential evolution for maximizing of weighted distances of vectors in a set of vectors. Increase in vector distances simplifies searching for the best matching vector what is a common task in many areas (for instance in biometric identification of people). Maximizing of weighted distances itself is co...
Article
This paper deals with the utilization of a symbolic regression tool, which is Analytic Pro- gramming (AP), together with two evolutionary algorithms, the Self-Organizing Migrating Algorithm (SOMA) and Differential Evolution (DE), for the synthesis of a new control law. This synthesized chaotic controller secures the stabilization of higher periodic...
Article
In this paper, the utilization of chaos pseudorandom number generators based on three different chaotic maps to alter the behavior and overall performance of PSO algorithm is proposed. This paper presents results of testing the performance and behavior of the proposed algorithm on typical benchmark functions that represent unimodal and multimodal p...
Article
This paper describes the technique for revealing of steganography content in images by means of feedforward neural network. The work is connected with cryptography for information encoding and additional method for information hiding, which is called steganography. The substance of the paper explains the principle of hidden information detection in...
Conference Paper
In this paper, Differential Evolution (DE) is used in the task of optimization of batch reactor geometry. The novality of the approach is that a discrete chaotic Lozi map is used as the chaotic pseudo random number generator to drive the mutation and crossover process in DE. The results obtained are compared with original reactor geometry and proce...
Conference Paper
Full-text available
In this paper, Differential Evolution (DE) is used in the task of optimization of batch reactor geometry. The novality of the approach is that the six selected discrete dissipative chaotic maps are used as the chaotic pseudo random number generator to drive the mutation and crossover process in the DE. The optimized results obtained are compared wi...
Conference Paper
This research deals with a utilization of a tool for symbolic regression, which is analytic programming, for the purpose of the synthesis of a new robust control law. This universal synthesized robust chaotic controller secures the fully stabilization of selected set of discrete chaotic systems. The paper consists of the descriptions of analytic pr...